SEARCH KEYWORD -- CONTENT-SECURITY-POLICY



  Balancing Convenience and Security in the Digital World

 Source The digital world has made everyday life easier in ways that were unimaginable a few decades ago. Online banking, smart home automation, cloud storage, and seamless communication have changed how people work and interact. With a few clicks or a simple voice command, tasks that once required time and effort are now completed instantly. However, this increased accessibility comes with risks. Every day, cybercriminals look for weaknesses to exploit, putting personal data, financial in...

   DIGITAL WORLD,DATA SECURITY     2025-02-07 06:14:43

  JavaScript to open link in new window without being popup blocked

To ensure security and reduce spamming, modern browsers have implemented very strict rules on when a new window can be opened in a web page. Currently browsers restrict that any new web page to be opened in a new window must be initiated with an user action. The action is usually an user click event. Otherwise, a popup blocker would show on the browser address bar which indicates that something is blocked. To workaround this issue, normally you should implement the window open logic in a click e...

   JAVASCRIPT,IFRAME,NEW WINDOW,OPEN LINK     2018-09-22 04:29:30

  Uber’s audio recording plan in Brazil and Mexico

Uber has recently come out with a plan to introduce a new feature to its App in Brazil and Mexico. The feature will record the conversations between the driver and the passenger, with their consent. But consent here is a bit tricky. Basically, if the driver decides to turn on the recording feature, they are not obligated to warn the passenger and vice versa. Once the recording has been made and submitted to support for some kind of violation, neither of the two parties will have the ability...

   UBER,SECURITY,PRIVACY,VOICE RECORDING APP,NEW FEATURE     2019-11-21 09:20:36

  Techies: Let's Not Forget Brain Hacking

A close-up of a jellyfish

Description automatically generated with low confidence Credit: SergeyNivens via Canva The world of cyber security never fails to surprise us with bolder and more sophisticated cyber-attacks and...

   HACKING     2022-02-03 21:43:11

  Access control in Java -- doPrivileged

Previously we have introduced how Java performs permission check to protect resource access. What if sometimes we need to give some class the temporary access to some resource which it initially doesn't have? AccessController provides six doPrivileged methods to fulfill this requirement. These six methods have below signatures : static T doPrivileged(PrivilegedAction action)static T doPrivileged(PrivilegedAction action, AccessControlContext context)static T doPrivileged(PrivilegedExceptionA...

   JAVA,SECURITY,DOPRIVILEGED     2016-03-08 05:46:42

  Proximity Cards Do More Than Just Open Doors

Credit: Susanne Plank via Pexels Locksmiths from centuries ago couldn’t have possibly imagined opening a door by tapping a card roughly the size of a credit card. Back then, security depended on physical locks, not sealed antennas made from coiled wire, integrated circuits, and capacitors. Today, proximity cards are a popular form of keycard used in hotels, government buildings, healthcare facilities, and many more places. They open doors for people with authorized access, but they also d...

   LOCK,PRINTING     2024-04-11 22:04:07

  Different types of keystore in Java -- Overview

Keystore is a storage facility to store cryptographic keys and certificates. They are most frequently used in SSL communications to prove the identity of servers and clients. A keystore can be a file or a hardware device. Three are three kinds of entries can be stored in a keystore depending on the types of keystores. The three types of entries are: PrivateKey : This is a type of keys which are used in asymmetric cryptography. It is usually protected with password because of its sensitivity. It ...

   JAVA,KEYSTORE,OVERVIEW,JKS,PKCS12,JCEKS,PKCS11,DKS,BKS     2014-08-18 02:09:54

  How to Prevent a Data Breach: Guide For Businesses

The consequences of a data breach are nothing to joke about. From reputation damage to regulatory fines, it is a disaster for any business. So you should always strive to do your best to prevent it. But with so many steps to take, where do you even begin? Businesses of all shapes and sizes should follow this 8-step approach: 1. Outline Your Assets Your assets, whether digital or physical, should always remain in your sight. It should be the very first step you take. Picture anything that might r...

   DATA SECURITY     2020-03-04 08:16:44

  A list of different CAPTCHA designs

Here is a list of website CAPTCHA designs which demonstrate all kinds of weird verification methods. By looking at these designs, as a website designer, you should distinguish which design is accessible and which is not.Is this human readable?What characters are in the picture?One moreWe will be crazy if we see theseOMG,What's the answer?IQ Test?Are you a normal person?You know how blind people read?ASCII PictureAre you an adult?3D verification codereCaptchaIt increase a new feature recently. It...

   CAPTCHA,Website design     2012-07-19 11:51:06

  A completely new approach to surveillance - should you be worried?

Paranoia is not necessarily a bad thing - assuming someone is really out there to get you. True or not, the paranoid have had issues they need to control explode as the internet developed, they also got specific tools to make their secrets (or their life, not everybody has a dark secret) more secure and under control. Unfortunately to them, and to the amazement of science and science fiction fans worldwide, a new way of obtaining secrets has appeared and it’s something very few expected. ...

   security     2014-08-11 05:41:58